72,732 research outputs found
Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users
Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension. As a definable cohort, the elderly generally lack awareness of current security threats, and remain under-educated in terms of applying appropriate controls and safeguards to their computers and networking devices. This paper identifies that web-based computer security information sources do not adequately provide helpful information to senior citizen end-users in terms of both design and content
Intrastate Crowdfunding in Alaska: Is There Security in Following the Crowd?
This Note analyzes the potential of crowdfunding for the State of Alaska. Crowdfunding can open up new sources of revenue for small businesses while simultaneously providing an avenue for Alaskans to invest in their own communities. The potential, however, must be weighed against the risk of fraud, poorly run businesses, and the lack of protection for investors. It is the responsibility of the Alaska legislature, the State’s securities administrators, and the Securities and Exchange Commission to ensure that investors are adequately protected. This Note discusses Alaska’s crowdfunding legislation, the Alaska Intrastate Crowdfunding Exemption, and recommends changes to the legislation that account for the risks involved in crowdfunding while still capturing its potential
Can Google searches help nowcast and forecast unemployment rates in the Visegrad Group countries?
Online activity of the Internet users has been repeatedly shown to provide a
rich information set for various research fields. We focus on the job-related
searches on Google and their possible usefulness in the region of the Visegrad
Group -- the Czech Republic, Hungary, Poland and Slovakia. Even for rather
small economies, the online searches of their inhabitants can be successfully
utilized for macroeconomic predictions. Specifically, we study the unemployment
rates and their interconnection to the job-related searches. We show that the
Google searches strongly enhance both nowcasting and forecasting models of the
unemployment rates.Comment: 22 pages, 2 figures, 3 table
A Wolf in Sheep���s Clothing? An analysis of student engagement with virtual learning environments.
The article is freely available on-line via The Higher Education Academy website.The growth in the use of virtual learning environments to support learning and teaching should be accompanied by research to examine their effectiveness. The aim of this study was twofold: a) To explore the views, opinions and experiences of student engagement or non-engagement in online learning activities; b) To use this knowledge to develop learning and teaching strategies that enhance student engagement with online learning activities. Focus groups were conducted with students studying leisure and tourism degree programmes to explore reasons for usage and non-usage of the online activities in the Wolverhampton Online Learning Framework (WOLF). Results identified issues related to student awareness, motivation, behaviour and learning approaches, assessment and technical factors. Findings from the study have implications for practice, including how to enhance the relevance of information, technical factors, enhancing awareness and links with assessment
OMS FDIR: Initial prototyping
The Space Station Freedom Program (SSFP) Operations Management System (OMS) will automate major management functions which coordinate the operations of onboard systems, elements and payloads. The objectives of OMS are to improve safety, reliability and productivity while reducing maintenance and operations cost. This will be accomplished by using advanced automation techniques to automate much of the activity currently performed by the flight crew and ground personnel. OMS requirements have been organized into five task groups: (1) Planning, Execution and Replanning; (2) Data Gathering, Preprocessing and Storage; (3) Testing and Training; (4) Resource Management; and (5) Caution and Warning and Fault Management for onboard subsystems. The scope of this prototyping effort falls within the Fault Management requirements group. The prototyping will be performed in two phases. Phase 1 is the development of an onboard communications network fault detection, isolation, and reconfiguration (FDIR) system. Phase 2 will incorporate global FDIR for onboard systems. Research into the applicability of expert systems, object-oriented programming, fuzzy sets, neural networks and other advanced techniques will be conducted. The goals and technical approach for this new SSFP research project are discussed here
Recommended from our members
Understanding Positive Play: An Exploration of Playing Experiences and Responsible Gambling Practices
This study is one of the first to explore in detail the behaviors, attitudes and motivations of players that show no signs of at-risk or problem gambling behavior (so-called ‘positive players’). Via an online survey, 1484 positive players were compared with 209 problem players identified using the Lie/Bet screen. The study identified two distinct groups of positive players defined according to their motivations to play and their engagement with responsible gambling practices. Those positive players that played most frequently employed the most personal responsible gambling strategies. Reasons that positive players gave for gambling were focused on leisure (e.g., playing for fun, being entertained, and/or winning a prize). By contrast, problem gamblers were much more focused upon modifying mood states (e.g., excitement, relaxation, depression and playing when bored or upset). The present study suggests that online gambling is not, by default, inherently riskier than gambling in more traditional ways, as online gambling was the most popular media by which positive players gambled. Furthermore, most positive players reported that it was easier to stick to their limits when playing the National Lottery online compared to traditional retail purchasing of tickets. Problem players were significantly more likely than positive players to gamble with family and friends, suggesting that, contrary to a popular RG message, social play may not be inherently safer than gambling alone. It is proposed that players (generally) may identify more with the term ‘positive play’ than the term ‘responsible gambling’ which is frequently interpreted as being aimed at people with gambling problems, rather than all players
Disloyal Computer Use and the Computer Fraud and Abuse Act: Narrowing the Scope
Congress drafted the Computer Fraud and Abuse Act (CFAA) to protect government interest computers from malicious attacks by hackers. As computer use has expanded in the years since its enactment, the CFAA has similarly expanded to cover a number of computer-related activities. This iBrief discusses the extension of the CFAA into the employer/employee context, suggests that this goes beyond the Act\u27s express purpose, compares the different approaches taken by the circuit courts in applying the CFAA to disloyal computer use by employees, and argues that the more recent approach taken by the Ninth Circuit provides a better model for determining if and when the CFAA should apply to employees
Metodologia badań politologicznych na przykładzie eurazjatyzmu
The text answers the following question: what is the point of conducting political science research? The research can make a lot of sense when you are strongly motivated and, motivation is just as important as your knowledge how to do it. In the latter case, you must proceed in the correct order. Firstly, the boundaries of the research field should be set, and secondly, original and unconventional research problems and hypotheses should be defined. Thirdly, the proper selection of primary and secondary sources is necessary. Fourthly, you choose appropriate research methods and techniques, and then construct a research tool or tools. After the determining of the level of accuracy and relevance of data collected, it is possible to proceed to the verification of hypotheses. The more thorough the process and the more inquisitive researcher, the more interesting research results are obtained.Tekst odpowiada na pytanie: jaki jest sens prowadzenia badań politologicznych? Wtedy, gdy ma się odpowiednią motywację i (co równie ważne) wie się, jak to można zrobić. W tym drugim przypadku musi się postępować w odpowiedniej kolejności. Po pierwsze, należy wyznaczyć granice pola badawczego, a po drugie, określić oryginalne, niebanalne problemy i hipotezy badawcze. Po trzecie, konieczny jest odpowiedni dobór i sposób selekcji źródeł pierwotnych i ewentualnie wtórnych. Czwartym etapem jest dobranie adekwatnych metod i technik badawczych, a następnie skonstruowanie narzędzia lub narzędzi badawczych. Po określeniu poziomu prawdziwości i stosowalności zebranych informacji możliwe jest dopiero przystąpienie do weryfikacji hipotez. Im bardziej ten ostatni proces będzie rzetelny, a badacz dociekliwy, tym ciekawsze uzyska się rezultaty badawcze
- …